Advanced Reverse Engineering

5 days

Course Overview

This course follows up on the introduction and completes the budding reverse engineering skills of students against modern, APT- related malware.

We start by discussing how malware conceals its behaviour to prevent reverse engineering including the following: encryption,
compression, mangling and self-unpacking shims.

We then present how malware hides itself to persist on a system, either as a user-mode program, or as a kernel-mode module.

Other covered subjects include communication features for communicating with other processes, command and control infrastructure, malware implemented using exotic runtime
technologies, and signature malware behaviour, such as keylogging and privilege elevation.

Materials to bring

Laptop computer able to run 64-bits virtual machines.
VMware Workstation 11+, or VMware Fusion 6+, or VMware Player 11+

Course prerequisites

Intro to Reverse Engineering

Course Breakdown

Day 1

APTs and their configurations
– Mangling
– Compression
– Encryption
– Self-unpacking

Day 2

Malware hiding techniques
– Code injection
– API hooking
– Hook injection
– APC injection
– Process hollowing
– SSDT hooking
– Filter drivers

Day 3

Malware communication
– Inter-process communication
– Configuration files
– File transfer
– C2 communication

Day 4

Strangely constructed malware
– C++
– COM
– Delphi

Day 5

Recognizing typical constructs
– Key logging
– Shell redirection
– Privilege escalation
– Driver/service installation

acp_pdf-2_file_document